keyboard_arrow_up
Efficient Defense System for IP Spoofing in Networks

Authors

Emil Kuriakose John and Sumaiya Thaseen, VIT University, India

Abstract

In this age of gigabit Ethernet and broadband internet, network security has been the top priority for most of the researchers. Technology advancements have advantages as well as disadvantages. Most of the communication of present world, the e-world, takes place online, through the internet. Thus the context of network intrusions and attacks to hack into servers also came into existence. A technique to perform this activity is made possible by preventing the discovery of the sender’s identity through IP Spoofing [7]. Many popular internet sites have been hacked and attackers try to forge or spoof the source addresses in IP packets. Using spoofing detection technique, the user can retrieve the list of IP addresses and able to identify the malicious IP addresses.Hence mechanisms must be designed to prevent hacking. This paper proposes a novel technique to detect IP spoofing based on traffic verification and filtering.

Keywords

Distributed Denial of service attack (DDoS), Replay attack, Blind Spoofing. IP Spoofing, Time to Live (TTL), Hop Count Filtering (HCF).

Full Text  Volume 2, Number 4